Network Access Control: User and Device Authentication
By: Intel Corporation View more from Intel Corporation >>
Download this next:
Focus: Network security
By: TechTarget ComputerWeekly.com
Type: eGuide
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
All of this adds up to a real problem for hard-worked network managers, who are coming under more and more pressure to maintain the everyday running of the enterprise network while protecting it from multiple different threats to its well-being. One mistake could bring an entire business down for days, and in some cases, this can prove fatal.
In this guide we will explore some of the key themes driving enterprise network security initiatives, from how to protect and monitor day-to-day activity on the network, to tips on how to defend it from malicious external attackers, and the effect that emerging networking technologies, such as the Internet of Things (IoT) and software-defined networking (SDN) will have on enterprise network security, and how to adapt to face these changing realities.
These are also closely related to: "Network Access Control: User and Device Authentication"
-
Network security in the post-pandemic era
By: TechTarget ComputerWeekly.com
Type: eGuide
With networks coming under strain due to the growth in remote work, cloud adoption and other digital transformation efforts, organisations have been struggling to get a handle on network security.
This comes at a time when cyber attackers have been on the prowl, knocking on the doors of networks that are insecure in order to gain access to critical systems.
Such challenges have prompted organisations to revamp their network security architecture, leveraging concepts like zero trust to keep threat actors at bay.
In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends. -
Accelerate compliance to regulations with secure SD-WAN
By: Hewlett Packard Enterprise
Type: White Paper
Security and compliance are top priorities for networking and security teams. With Zero Trust and SASE architectures, the network can become a security solution—improving connectivity experiences and compliance at the same time.
Key take-aways
- Tackle the threats and security challenges posed by data growth, data privacy, and remote access by adopting Zero Trust and SASE architectures.
- Accelerate compliance to regulations and standards by providing data encryption, securing web access, and preventing data loss and malware attacks.
- Secure SD-WAN offers an enhanced user experience and flexibility.
Find more content like what you just read:
-
Next generation network security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
-
In 2017, the insider threat epidemic begins
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
Royal Holloway: Purple team playbook – threat modeling for security testing
By: TechTarget ComputerWeekly.com
Type: Research Content
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
-
Zero Trust Lateral Access Control
By: Zentera Systems Inc.
Type: Product Overview
Secure your network by controlling lateral access with zero trust identity. Learn how Zentera's CoIP Platform enables targeted lateral access controls to defend against advanced threats inside your network. Read the solution brief to discover this elegant zero trust approach.
-
Network Security: Spotlight on Australia/New Zealand
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
-
12 essential features of advanced endpoint security tools
By: TechTarget ComputerWeekly.com
Type: eGuide
Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.
-
Key considerations for today's SASE buying teams
By: Windstream Enterprise
Type: eBook
This detailed SASE buying guide outlines key considerations for today's buying teams, including SASE components, market trends, benefits and the purchasing process. Learn how SASE can secure your network and workforce. Read the full guide.
-
A Computer Weekly buyer's guide to perimeterless network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
How Can Healthcare Protect Against Zero-Day Attacks and What Does It Mean?
By: XtelligentMedia Healthcare
Type: eGuide
Zero-day attacks pose significant dangers to the healthcare sector, but defenders can mitigate risk by patching early and often.
-
A Computer Weekly e-guide to SASE
By: TechTarget ComputerWeekly.com
Type: eGuide
Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
-
CW APAC: Expert advice on zero-trust security
By: TechTarget ComputerWeekly.com
Type: Ezine
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
DNS, powered by intelligence: The Centripetal Advantage
By: Centripetal Networks
Type: Blog
At no point in human history have organizations spent as much money on cybersecurity as they currently are. CleanINTERNET DNS is designed to bring enterprises cost-effective cybersecurity, by incorporating the world’s largest threat intelligence collection to provide you with comprehensive vision of threats. Read the blog to learn more.
-
CW APAC: Buyer’s guide to SASE
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
-
Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
-
SDP vs. Zero Trust vs. VPN: Comparing Network Security Technology
By:
Type: Video
SDPs, zero trust, and VPNs are three methods of securing an enterprise. VPNs have historically served as businesses’ main defense against external threats by encrypting tunnels between networks. But SDPs and zero trust networks are increasing in popularity, too. SDPs are networks that sit atop other networks to hide them from attackers or unauthorized users, acting like a cloak of invisibility to prevent network-based attacks. Zero-trust networks assume any user or device cannot be trusted, restricting every user’s access to network resources -- regardless of identity or network access history.
-
How to get started with SASE
By: TechTarget ComputerWeekly.com
Type: Infographic
Implementing a SASE architecture can help increase operational efficiency, create a more consistent UX and improve security. But it does require planning. In this infographic, we look at seven simple steps that can help any organization begin to develop a roadmap to tackle SASE.
-
Infographic: SIEM vs. SOAR vs. XDR
By: TechTarget ComputerWeekly.com
Type: Infographic
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
-
NDR for the SOC: Findings from Enterprise Strategy Group
By: Corelight
Type: ESG Research Report
37% of organizations cite increasingly sophisticated threats as a major threat detection and response challenge, according to research by TechTarget’s Enterprise Strategy Group (ESG). So, how can businesses close the gaps in threat detection and response? Review this ESG research report to learn how open NDR can support that mission.
-
Mastering Cilium for Kubernetes Compliance
By: Cisco
Type: eBook
Cilium simplifies Kubernetes compliance with advanced networking, security, and observability features. Learn how Cilium addresses NIST 800-53 and 800-190 controls for access control, auditing, and incident response in this white paper.
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
Analyst Report: Requirements for a Modern Firewall Platform
By: SonicWall
Type: ESG Research Report
Using more cloud applications, providing network access to more IoT devices: These are two of the many factors that complicate network security for modern organizations. So, how can your business address those complexities and secure your network? Find out in this research report by Enterprise Strategy Group (ESG).
-
Accelerate digital and network transformation with service providers
By: Lumen
Type: Analyst Report
This IDC InfoBrief explores the current and future state of digital and network transformation, highlighting the critical role service provider partners play in accelerating business outcomes. Key insights include top challenges, benefits, and criteria for evaluating partners. Read the full report to learn more.
-
Insights on achieving network diversity and business continuity
By: Sinch
Type: White Paper
Network diversity is crucial for business continuity, but using multiple carriers doesn't always achieve true diversity. Learn how a single carrier with robust network architecture can provide reliable, redundant communications to keep your business connected. Read the full white paper to discover Sinch's approach to network diversity.
-
Bolster signature-based malware detection with machine learning
By: Sentinel Labs, Inc.
Type: eGuide
Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
-
9 essential elements of network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
-
7 reasons why analysts recommend SASE: What you should know
By: Windstream Communications
Type: eBook
In order to keep up with the evolving security landscape, analysts recommend SASE for its convergence of networking and security, gradual migration path, and ability to future-proof businesses. Access the e-book to discover more.
-
7 NAS encryption best practices to protect data
By: TechTarget ComputerWeekly.com
Type: eBook
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
-
SonicWall Next-Generation Firewall Buyer's Guide
By: SonicWall
Type: Buyer's Guide
As enterprises embrace cloud, remote work, and new threats, next-generation firewalls (NGFWs) must evolve to provide robust security controls, performance, and management. Evaluate NGFW features like sandboxing, multi-instance, and threat intelligence to find the right fit for your network. Read the full Buyer's Guide to learn more.
-
Focus: Campus local area networks (LAN)
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
-
How Retailers Use LTE as Wireless WAN to Improve Service & Operations
By: Ericsson
Type: White Paper
Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.
-
Accounting for the variables of modern security
By: Hughes Network Systems
Type: Webcast
Digital transformation has introduced numberless variables into the security equation, rendering it much more complex. In this Hughes Network Tech Talk webinar, Michael Ferguson, quantifies the cyber threats facing a typical enterprise in the first hour of each day. Watch now to learn more.
-
Accounting for the variables of modern security
By: Hughes Network Systems
Type: Webcast
Digital transformation has introduced numberless variables into the security equation, rendering it much more complex. In this Hughes Network Tech Talk webinar, Michael Ferguson, quantifies the cyber threats facing a typical enterprise in the first hour of each day. Watch now to learn more.
-
Infographic: 12 API security best practices
By: TechTarget ComputerWeekly.com
Type: Infographic
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
Cyber Security 2016 and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
Threat management: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
The Inadequacy of Perimeter-Based Security in Today's Distributed World
By: Zscaler
Type: eGuide
Modern work environments are characterized by employees operating both inside and outside the office, using diverse applications hosted in the cloud, and accessing data from a variety of devices. This hyper-distribution of resources has widened the attack surface leaving perimeter-based security architectures ineffective against today's threats.
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
5 things SASE does that SD-WAN can't
By: Cato Networks
Type: Webcast
Secure access service edge (SASE) has emerged as a leading means of implementing network security. In this webcast, Cato Networks Vice President, Eyal Webber-Zvik, explores the benefits of SASE as a tool for securing modern networks, comparing it SD-WAN, and arguing for its superiority. Watch now to learn more.
-
7 characteristics of next-generation networking
By: TechTarget ComputerWeekly.com
Type: eGuide
The term next-generation networking refers to the process of designing network infrastructure with new, advanced technologies. Next-generation networks are flexible, nimble and secure architectures that are easier to manage. In this article, analysts offer their perspectives on which technologies help modernize network infrastructures.
-
Focus ASEAN: Enterprise Mobility
By: TechTarget ComputerWeekly.com
Type: eGuide
With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.
-
Software-defined networking: Spotlight on ASEAN
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.
-
Best practices for identity access and security compliance
By: JAMF
Type: White Paper
Zero trust network access (ZTNA) is a critical component and key player in the future of cybersecurity, and this white paper explores key best practices you can implement to optimize ZTNA and defend identities. Read on to learn more.
-
Ransomware Breach Prevention 101: Securing Your VPN
By:
Type: Talk
The COVID pandemic is changing the threat landscape for security teams. With the multitude of home devices, from smartphones to TVs to thermostats and others, home networks are more vulnerable. Bad actors see this weakness and are using the home VPN as another attack vector into the corporate network. Airgap Networks is striving to help Security teams adapt quickly to this changing environment. In the session, we will demonstrate how to control access policies between devices and ensure secure access to employee/partner-facing applications for the modern enterprise with protocol-agnostic and agentless remote access security enforcement.
-
Zero-Trust | The Next Generation in Secure Enterprise Application Access
By:
Type: Talk
The classic perimeter-based network security architecture has been in place for 30 years. So it comes with no surprise that Gartner reports that by 2023, 60% of enterprises will phase out most of their remote access virtual private networks (VPNs) in favour of Zero-Trust Network Access*. In today’s new (work) reality, users and applications are no longer confined to the corporate network, and security organisations are challenged with protection and visibility like never before. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust, easier to manage and provides end-to-end visibility no matter where it’s deployed. Join us as we explore why in this new (work) reality, enterprises need a better alternative for secure remote application access. In this session, we will specifically dive in to: - Benefits of a cloud-delivered secure remote access with simple deployment and central policy management - How to leverage zero-trust security with adaptive controls and micro-segmented application access to isolate your network from threats - How to accelerate cloud migration with user-cloud access, multi-cloud connectivity and hybrid-cloud connectivity - Why an always-on, zero-trust security architecture system can provide protection beyond the traditional perimeter. *Source: Gartner Market Guide to Zero-Trust Network Access.
-
The Ultimate Guide to Enterprise Security
By:
Type: Replay
With a worldwide shift from on-site offices, devices and networks to remote workforces who require anywhere and anytime access to corporate resources, security is paramount to protecting employees, data and organizations as a whole from threats, breaches and costly downtime. In our webinar, Ultimate Guide to Enterprise Security, we cover everything you need to know about what enterprise security. Plus we’ll share: • The importance of enterprise security from user to device to network • What threats exist across the Apple landscape • How to strengthen your security posture
-
Secure internet: Boost productivity and protect your business
By: Vodafone
Type: Infographic
Secure remote access and hybrid work with Vodafone's Secure Connected Enterprise. Discover how to protect your business from internet-based threats, enforce compliance, and enhance employee productivity. Read the infographic to learn more.
-
Royal Holloway: Cloud-native honeypot deployment
By: TechTarget ComputerWeekly.com
Type: Research Content
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.